Thu.Apr 16, 2020

article thumbnail

Continuous Reliability: Handling ‘Known Unknowns’ and ‘Unknown Unknowns’

OverOps

Know your unknowns with the help of continuous reliability. Let’s rewind to the year 2002 (this should give you an idea of how long I have been working in software development). Mr Donald Rumsfeld, then United States Secretary of Defense, had this to say in response to a question: . While this statement was not made in reference to software, the underlying principles are applicable to the way we think about software troubleshooting.

article thumbnail

Boost Your Credibility and Visibility with Public Relations

TechSoup

Your organization needs exposure. If people do not know that your NGO exists, there's no way that they can become volunteers, supporters, and donors.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Digital transformation, fast forward: Time to adjust—and accelerate

TechBeacon

As technologists and business strategists emerge from the immediate scramble of scaling up distributed workforces in response to the COVID-19 crisis, they're confronting the even more daunting task of adjusting digital strategies and business models for sustainability in a post-pandemic world.

article thumbnail

What’s New in Apache Kafka 2.5

Confluent

On behalf of the Apache Kafka® community, it is my pleasure to announce the release of Apache Kafka 2.5.0. The community has created another exciting release. We are making progress […].

144
144
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Zoom #fails grow: 530,000 passwords leaked, details for sale by hacker

TechBeacon

Zoom can’t seem to catch a break. The latest bad press for the videoconference service is about reused username/password pairs. It seems hackers have discovered half a million compromised, reused credentials matching Zoom accounts.

140
140

More Trending

article thumbnail

Small businesses unprepared for remote working, most don’t provide cybersecurity training

CTOvision

Stay-at-home orders for more than 40 states have forced millions of businesses to establish remote workforces that rely solely on internet-enabled applications and products to conduct business. The overnight move to a “virtual workplace” has increased cybersecurity concerns for small business owners, but many still have not implemented remote working policies to address cybersecurity threats, […].

article thumbnail

Is It Time to End the Software Metric Madness?

DevOps.com

We have all heard the phrase “What gets measured, gets managed,” often attributed to Peter Drucker—interesting note about this quote, Drucker didn’t say it. In the DevOps space, or application development and delivery generally, this quote is often used as a justification to measure things like deployment velocity, bug fixes, lead time and so on, […].

Metrics 123
article thumbnail

You’re One Misconfiguration Away from a Cloud-Based Data Breach

CTOvision

Read why Suresh Kasinathan says that small and medium businesses are just a misconfiguration away from a cloud-based data breach on Dark Reading : Not all instances of data exposure in the cloud are the product of malicious intentions from either internal or external actors. In its “2019 Data Breach Investigations Report” (DBIR), for instance, […].

Cloud 96
article thumbnail

Twilio Provides 90-Day Free Developer Access to Video Service

DevOps.com

Twilio this week announced it will make its video services available for free for three months to developers who are building applications to address COVID-19 pandemic uses cases in the health care, education and nonprofit sectors if they sign up to use the platform before June 30. Jesper Joergensen, general manager for voice and video […]. The post Twilio Provides 90-Day Free Developer Access to Video Service appeared first on DevOps.com.

Video 118
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Reframing Insider Threat: What Does it Mean When Everyone’s Working from Home?

CTOvision

Read why y Carl Eberling says that companies need to reframe their insider threat strategy to include work from home during COVID-19 pandemic on BW Smart Cities : There’s no shortage of articles and blog posts discussing the near-term implications of our current situation. Cloud services and applications fill the void to help ensure employee […].

article thumbnail

Build Better CX Across the Entire User Journey with AIOps

DevOps.com

Ready or not, digital experiences are now the gateway to customers and the standard-bearer of a company’s brand. Yet, as apps become more distributed, more intelligent and more real-time, they continue to run on infrastructure that resides within on-prem data centers as well as multiple public clouds. This complexity is underscored by gaps across IT […].

article thumbnail

Microsoft: Cyber-Criminals Are Targeting Businesses Through Vulnerable Employees

CTOvision

Microsoft has warned that cyber-criminals are preying on people’s vulnerable psychological states during the COVID-19 pandemic to attack businesses. During a virtual press briefing, the multinational technology company provided data showing how home working and employee stress during this period has precipitated a huge amount of COVID-19-related attacks, particularly phishing scams.

article thumbnail

VMware Makes vRealize Automation Framework Available via the Cloud

DevOps.com

VMware this week announced it has made a software-as-a-service (SaaS) edition of its vRealize automation platform generally available. Taruna Gandhi, senior director for product and technical marketing at VMware, said VMware vRealize Operation Cloud will make IT automation more accessible to a broader swath of organizations that might not be able to implement IT automation […].

Cloud 113
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Businesses Skating on Thin Ice Using Third-Party Services

CTOvision

Read James Efron take a look at why third-party services are risky for business on Security Boulevard : Every year businesses lose millions of dollars in data breach incidents. A survey by Ponemon Institute revealed a 3% increase in third-party data breaches in 2018, with 59% of companies experiencing a breach due to third parties […].

Survey 95
article thumbnail

The Key to Embracing DevOps: A Real-Time Roadmap

DevOps.com

While the term “DevOps” has become somewhat of an industry buzzword, it represents an important shift in the way teams think about planning, building and deploying software. Drawing its inspiration from the Agile movement, DevOps extends many of Agile’s core principles beyond development to how teams deploy, monitor and inform their next round of product […].

DevOps 112
article thumbnail

What Is VPR and How Is It Different from CVSS?

Tenable

This blog series will provide an in-depth discussion of vulnerability priority rating (VPR) from a number of different perspectives. Part one will focus on the distinguishing characteristics of VPR that make it a more suitable tool for prioritizing remediation efforts than the Common Vulnerability Scoring System (CVSS). What is VPR? Vulnerability priority rating (VPR), the output of Tenable Predictive Prioritization , helps organizations improve their remediation efficiency and effectiveness by

article thumbnail

Practical Advice on How to Use Lead Time

DevOps.com

Many ALM tools and Value Stream Management platforms graph lead time, but few really tell you what to do about it, how to use it and why you shouldn’t use the average. In fact, so much of what is written on this subject is rather vague and hand wavy. Part of the reason is that […]. The post Practical Advice on How to Use Lead Time appeared first on DevOps.com.

How To 109
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Turn Chaos Into Profit: Understanding the ETL Process

Toptal

ETL can consolidate data from various sources into an organized, reliable, and usable database. This allows businesses to employ previously unused or underused data to improve their performance. In this article, Toptal Data Modeling Developer Alexandre Wanderer demonstrates all stages of the ETL process in building a data warehouse.

article thumbnail

Supporting our partners, communities and schools during the global COVID-19 response

Gitprime

Learn how we’re granting $1.25M to support Pluralsight One’s nonprofit partners and bolster regional COVID-19 emergency responses in the communities where we live and work.

article thumbnail

Article: Working Remotely: Good Practices and Useful Resources

InfoQ Culture Methods

As the impact of COVID-19 continues around the world, many people will be experiencing a sustained period of remote working for the first time. To help you, we’ve collated remote working good practices and resources and will continue to do so as more emerges. While remote working may appear straightforward, there are common issues that come up as you shift to this way of working.

article thumbnail

How to Add Native Keyword Aliases to Babel

David Walsh

Those of you who follow this blog know that not every blog post is an endorsement of a technique but simply a tutorial how to accomplish something. Sometimes the technique described is probably not something you should do. This is one of those blog posts. The Babel parser is an essential tool in the web stack these days. Babel helps us to use JavaScript patterns before they hit the browser (optional chaining) as well as JSX for React.

How To 96
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How Do Bugs Come Into Our Ways?

MagmaLabs

Reading Time: 4 minutes It’s impossible to build the perfect software. What is achievable in reality is to add the more value we can in what we’re building by knowing what the reasons for the most common causes of software failures are. That way you can eradicate them from the root. Everybody in software development talks about bugs, but have you ever thought about why bugs come into our ways?

article thumbnail

Breaking the COVID-19 Chain with Data Analytics

Teradata

How can Teradata's data analytics platform help communities stop the spread of COVID-19? Find out more.

Analytics 124
article thumbnail

The Gartner Market Guide for Network Performance Monitoring and Diagnostics Highlights Network Challenges

Kentik

Last month we saw the publication of the Gartner Market Guide for Network Performance Monitoring and Diagnostics 1 (NPMD). If you’re unfamiliar with this Market Guide, it may be because this year, and for future publications, Gartner moved this from its previous version of a Magic Quadrant. We believe the reason for the shift is particularly because buyers are still purchasing traditional network monitoring tools.

Network 89
article thumbnail

Improving Data Quality With an Efficient Data Labeling Process

Dataiku

A key principle behind data preparation that data scientists regularly hammer home is that of garbage in, garbage out — if your data is flawed going into a machine learning process, you are bound to receive flawed results, algorithms, and worse, business decisions.

Data 80
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

How the COVID-19 Epidemic is like Cybersecurity

Coalfire

Today, every citizen is on the front lines of the epidemic. We are flooded with information about staying safe, keeping an eye out, and left to process unfamiliar language. We are all suddenly doctors and epidemiologists analyzing information and predicting how the world is changing. With countless health professionals, scientists, and officials publishing cautionary tales, it may sound like when your organization’s CISO tells you that Cybersecurity is everyone’s job, and perhaps thr

article thumbnail

5 Global Systems Integrator partnering trends for 2020 that will benefit enterprise customers

DXC

Businesses have been doing some form of partnering for decades, but as companies seek to modernize and turn their organizations into digital enterprises, partnering has become more important than ever. With all the different technologies and systems that have to integrate, digital transformation can’t happen unless all parties are in sync and cooperating with one […].

System 72
article thumbnail

Continuity during “Business as Unusual”

Beyond B2B

In these challenging times we see many companies struggling – both to ensure the health of their employees and customers, and to keep their core processes running.

Company 76